Skip to content

Category Archives: Computer Networks

Routing is a procedure that helps the packet choose an optimal path to reach its destination as soon as possible. For example, a device can… Read More
Transport Layer Security is a successor of the Secure Sockets Layer it was developed in order to provide a safe channel between two parties. The… Read More
Signaling Connection Control Part (SCCP) is the terminal control for the use of Voice (Communication) Channel over IP i.e. (VoIP) And The Signaling Connection Control… Read More
Krita is a free and open-source raster graphics editor designed primarily for digital painting and 2D animation. It runs on Windows, macOS, Linux, Android, and… Read More
Poison Reverse is a loop avoidance method used in Routing Information Protocol (RIP) in Distance Vector Routing Protocol (DVRP) which allows a RIP enabled interface… Read More
Bridge Protocol Data Unit (BPDU) is a spanning tree protocol (STP) message unit which describes the switch port attributes such as MAC address, priority, and… Read More
CSP refers to the communication service providers. They provide us services in different means or in different fields of communication media. Communication service provider (CSP)… Read More
General Packet Radio Service(GPRS) is the packet and data transfer service designed to replace circuit-switched services available on a 2G global system for mobile communication.… Read More
A Deadlock is a situation where a set of processes are blocked because each process is holding a resource and waiting for another resource occupied… Read More
Port Blocking is the action performed by an Internet Service Provider (ISP) to identify and block the Internet traffic by using the Port Number and… Read More
Dynamic Host Configuration Protocol(DHCP) uses the DORA. Dynamic Host Configuration Protocol is the protocol of the application layer. It is used to provide Subnet Mask,… Read More
Access control is a security mechanism to put restrictions on the accessibilities of the resources and decide who or what can view or use the… Read More
The Threat, Vulnerability, and Risk these terms are interrelated but not the same. In this article, we are going to discuss the difference between them… Read More
Internet of Things or IoT is one of the most prominent innovations in recent times that has enhanced industrial automation. Due to sensor-based advancements and… Read More
A distributed system is a set of computers joined by some sort of communication network, each of which has its database system and users may… Read More

Start Your Coding Journey Now!